Implementation method

Step 1
Training about information security awareness
Step 2
Training about information security systems
Step 3
Training about secure coding with different languages (Java, .Net, Php, Python, ...)
Step 4
Rehearsal for incident response on the lab that simulates real-world attacks.

Results

Training curriculum corresponding to the courses
Performance reports and final exams